{"id":290,"date":"2021-11-18T17:19:15","date_gmt":"2021-11-18T17:19:15","guid":{"rendered":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/?p=290"},"modified":"2021-12-02T16:05:40","modified_gmt":"2021-12-02T16:05:40","slug":"atelier-2-2-definir-et-mettre-en-oeuvre-un-plan-de-gouvernance-en-securite-de-linformation-et-en-cybersecurite","status":"publish","type":"post","link":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/2021\/11\/18\/atelier-2-2-definir-et-mettre-en-oeuvre-un-plan-de-gouvernance-en-securite-de-linformation-et-en-cybersecurite\/","title":{"rendered":"Atelier 2-2 D\u00e9finir et mettre en \u0153uvre un plan de gouvernance en s\u00e9curit\u00e9 de l&rsquo;information et en cybers\u00e9curit\u00e9"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00a0\u00bb1&Prime; custom_padding_last_edited=\u00a0\u00bboff|desktop\u00a0\u00bb admin_label=\u00a0\u00bbHero\u00a0\u00bb _builder_version=\u00a0\u00bb3.22&Prime; use_background_color_gradient=\u00a0\u00bbon\u00a0\u00bb background_color_gradient_start=\u00a0\u00bb#ffffff\u00a0\u00bb background_color_gradient_end=\u00a0\u00bb#e7edf9&Prime; custom_margin=\u00a0\u00bb|||\u00a0\u00bb custom_padding=\u00a0\u00bb100px||100px|\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb130px||130px|\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row column_structure=\u00a0\u00bb3_4,1_4&Prime; admin_label=\u00a0\u00bbtitle and illustration\u00a0\u00bb _builder_version=\u00a0\u00bb3.25&Prime; background_size=\u00a0\u00bbinitial\u00a0\u00bb background_position=\u00a0\u00bbtop_left\u00a0\u00bb background_repeat=\u00a0\u00bbrepeat\u00a0\u00bb custom_margin=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb3_4&Prime; _builder_version=\u00a0\u00bb3.25&Prime; custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.11.1&Prime; header_font=\u00a0\u00bbMerriweather|700|||||||\u00a0\u00bb header_font_size=\u00a0\u00bb46px\u00a0\u00bb header_line_height=\u00a0\u00bb1.3em\u00a0\u00bb custom_margin=\u00a0\u00bb||0px|\u00a0\u00bb animation_style=\u00a0\u00bbflip\u00a0\u00bb animation_direction=\u00a0\u00bbtop\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h1>Atelier 2-2<\/h1>\n<p>[\/et_pb_text][et_pb_divider color=\u00a0\u00bb#4646c4&Prime; divider_position=\u00a0\u00bbcenter\u00a0\u00bb divider_weight=\u00a0\u00bb2px\u00a0\u00bb _builder_version=\u00a0\u00bb3.2&Prime; max_width=\u00a0\u00bb90px\u00a0\u00bb max_width_tablet=\u00a0\u00bb12%\u00a0\u00bb max_width_last_edited=\u00a0\u00bboff|desktop\u00a0\u00bb custom_margin=\u00a0\u00bb|||\u00a0\u00bb animation_style=\u00a0\u00bbflip\u00a0\u00bb animation_delay=\u00a0\u00bb50ms\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_divider][et_pb_text _builder_version=\u00a0\u00bb4.11.1&Prime; header_font=\u00a0\u00bbMerriweather|700|||||||\u00a0\u00bb header_font_size=\u00a0\u00bb46px\u00a0\u00bb header_line_height=\u00a0\u00bb1.3em\u00a0\u00bb custom_margin=\u00a0\u00bb||0px|\u00a0\u00bb animation_style=\u00a0\u00bbflip\u00a0\u00bb animation_direction=\u00a0\u00bbtop\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h1 style=\"text-align: left;\">D\u00e9finir et mettre en \u0153uvre un plan de gouvernance en s\u00e9curit\u00e9 de l&rsquo;information et en cybers\u00e9curit\u00e9<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_4&Prime; _builder_version=\u00a0\u00bb3.25&Prime; custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttp:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-content\/uploads\/sites\/24\/2021\/11\/Claude-Adam2.jpg\u00a0\u00bb title_text=\u00a0\u00bbClaude Adam2&Prime; _builder_version=\u00a0\u00bb4.11.1&Prime; custom_margin=\u00a0\u00bb|||\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb90px|||\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bboff|desktop\u00a0\u00bb always_center_on_mobile=\u00a0\u00bboff\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.11.1&Prime; text_font=\u00a0\u00bb||||||||\u00a0\u00bb text_text_color=\u00a0\u00bb#7e7f93&Prime; text_font_size=\u00a0\u00bb18px\u00a0\u00bb header_font=\u00a0\u00bb||||||||\u00a0\u00bb header_3_font=\u00a0\u00bbMerriweather|700|||||||\u00a0\u00bb header_3_text_color=\u00a0\u00bb#4646c4&Prime; header_3_font_size=\u00a0\u00bb36px\u00a0\u00bb header_3_line_height=\u00a0\u00bb1.4em\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h3><strong>Claude Adam<\/strong><\/h3>\n<p>Conseiller principal en s\u00e9curit\u00e9 de l&rsquo;information,\u00a0Ville de Blainville<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: justify;\">L&rsquo;atelier vise \u00e0 expliquer le r\u00f4le de la gouvernance versus le r\u00f4le de la s\u00e9curit\u00e9 op\u00e9rationnelle. Le conf\u00e9rencier traitera des diff\u00e9rents domaines de gouvernance n\u00e9cessaires \u00e0 une bonne gestion des risques dans le domaine municipal:<\/p>\n<p style=\"text-align: left;\">o <strong>Cat\u00e9gorisation des actifs informationnels<\/strong><\/p>\n<p style=\"text-align: left;\">o\u00a0<strong>Conformit\u00e9<\/strong><\/p>\n<p style=\"text-align: justify;\">o<strong> Continuit\u00e9 TI<\/strong><\/p>\n<p style=\"text-align: justify;\">o <strong>Encadrements<\/strong><\/p>\n<p style=\"text-align: justify;\">o\u00a0<strong>\u00c9valuation des risques<\/strong><\/p>\n<p style=\"text-align: justify;\">o\u00a0<strong>Gestion des exceptions (d\u00e9rogations)<\/strong><\/p>\n<p style=\"text-align: justify;\">o\u00a0<strong>Gestion des identit\u00e9s et des acc\u00e8s<\/strong><\/p>\n<p style=\"text-align: justify;\">o <strong>Gestion des tiers<\/strong><\/p>\n<p style=\"text-align: justify;\">o <strong>Gestion des vuln\u00e9rabilit\u00e9s<\/strong><\/p>\n<p style=\"text-align: justify;\">o\u00a0<strong>Gestion et suivi des risques<\/strong><\/p>\n<p style=\"text-align: justify;\">o <strong>Incidents en s\u00e9curit\u00e9 de l&rsquo;information et en cybers\u00e9curit\u00e9<\/strong><\/p>\n<p style=\"text-align: justify;\">o\u00a0<strong>Programme de cybers\u00e9curit\u00e9 et de s\u00e9curit\u00e9 de l&rsquo;information<\/strong><\/p>\n<p style=\"text-align: justify;\">o\u00a0<strong>Projets de s\u00e9curit\u00e9<\/strong><\/p>\n<p style=\"text-align: justify;\">o <strong>S\u00e9curit\u00e9 des projets<\/strong><\/p>\n<p style=\"text-align: justify;\">o\u00a0<strong>Sensibilisation et formation<\/strong><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_3,1_3,1_3&Prime; _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttp:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-content\/uploads\/sites\/24\/2021\/08\/cyber-security-icon-29.png\u00a0\u00bb title_text=\u00a0\u00bbcyber-security-icon-29&Prime; align=\u00a0\u00bbcenter\u00a0\u00bb _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb width=\u00a0\u00bb50%\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_button button_url=\u00a0\u00bbhttps:\/\/www.evenementlepointensante.com\/colloque\/colloque-cybersecurite-secteur-municipal\/\u00a0\u00bb url_new_window=\u00a0\u00bbon\u00a0\u00bb button_text=\u00a0\u00bbINSCRIPTION\u00a0\u00bb button_alignment=\u00a0\u00bbcenter\u00a0\u00bb _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_size=\u00a0\u00bb17px\u00a0\u00bb button_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb button_bg_color=\u00a0\u00bb#5bd8dd\u00a0\u00bb button_border_width=\u00a0\u00bb0px\u00a0\u00bb button_border_radius=\u00a0\u00bb100px\u00a0\u00bb button_font=\u00a0\u00bbOverpass|900||on|||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; admin_label=\u00a0\u00bbSpeakers\u00a0\u00bb _builder_version=\u00a0\u00bb3.22&Prime; custom_padding=\u00a0\u00bb90px||90px|\u00a0\u00bb animation_style=\u00a0\u00bbzoom\u00a0\u00bb animation_intensity_zoom=\u00a0\u00bb10%\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row column_structure=\u00a0\u00bb1_3,2_3&Prime; disabled_on=\u00a0\u00bbon|on|on\u00a0\u00bb _builder_version=\u00a0\u00bb4.11.1&Prime; custom_margin=\u00a0\u00bb|||\u00a0\u00bb custom_padding=\u00a0\u00bb40px|0px|40px|0px\u00a0\u00bb disabled=\u00a0\u00bbon\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb3.25&Prime; custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttp:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-content\/uploads\/sites\/24\/2021\/11\/portrait-square-05.jpg\u00a0\u00bb _builder_version=\u00a0\u00bb3.23&Prime; custom_margin=\u00a0\u00bb|||\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb90px|||\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bboff|desktop\u00a0\u00bb always_center_on_mobile=\u00a0\u00bboff\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_social_media_follow _builder_version=\u00a0\u00bb3.0.105&Prime; text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_social_media_follow_network social_network=\u00a0\u00bbfacebook\u00a0\u00bb _builder_version=\u00a0\u00bb3.0.101&Prime; background_color=\u00a0\u00bb#181819&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb follow_button=\u00a0\u00bboff\u00a0\u00bb url_new_window=\u00a0\u00bbon\u00a0\u00bb]facebook[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=\u00a0\u00bbtwitter\u00a0\u00bb _builder_version=\u00a0\u00bb3.0.101&Prime; background_color=\u00a0\u00bb#181819&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb follow_button=\u00a0\u00bboff\u00a0\u00bb url_new_window=\u00a0\u00bbon\u00a0\u00bb]twitter[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=\u00a0\u00bblinkedin\u00a0\u00bb _builder_version=\u00a0\u00bb3.0.101&Prime; background_color=\u00a0\u00bb#181819&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb follow_button=\u00a0\u00bboff\u00a0\u00bb url_new_window=\u00a0\u00bbon\u00a0\u00bb]linkedin[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=\u00a0\u00bbgoogle-plus\u00a0\u00bb _builder_version=\u00a0\u00bb3.0.101&Prime; background_color=\u00a0\u00bb#181819&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb follow_button=\u00a0\u00bboff\u00a0\u00bb url_new_window=\u00a0\u00bbon\u00a0\u00bb]google-plus[\/et_pb_social_media_follow_network][\/et_pb_social_media_follow][\/et_pb_column][et_pb_column type=\u00a0\u00bb2_3&Prime; _builder_version=\u00a0\u00bb3.25&Prime; custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb3.27.4&Prime; text_font=\u00a0\u00bb||||||||\u00a0\u00bb text_text_color=\u00a0\u00bb#7e7f93&Prime; text_font_size=\u00a0\u00bb18px\u00a0\u00bb header_font=\u00a0\u00bb||||||||\u00a0\u00bb header_3_font=\u00a0\u00bbMerriweather|700|||||||\u00a0\u00bb header_3_text_color=\u00a0\u00bb#4646c4&Prime; header_3_font_size=\u00a0\u00bb36px\u00a0\u00bb header_3_line_height=\u00a0\u00bb1.4em\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h3>Ionut Zamfir<\/h3>\n<p>Front End Developer, Elegant Themes<br \/>\n[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb3.27.4&Prime; text_font=\u00a0\u00bb||||||||\u00a0\u00bb text_font_size=\u00a0\u00bb18px\u00a0\u00bb text_line_height=\u00a0\u00bb1.8em\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]Curabitur arcu erat, accumsan id imperdiet et, porttitor at sem. Proin eget tortor risus. Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Donec velit neque, auctor sit amet aliquam vel ullamcorper.<\/p>\n<p><strong>Rapid Prototyping Tools:<\/strong> Saturday @ 1:00pm<\/p>\n<p><strong style=\"font-size: 18px;\">Intro to jQuery Workshop:<\/strong><span style=\"font-size: 18px;\"> Sunday @ 9:00am<\/span><br \/>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Atelier 2-2D\u00e9finir et mettre en \u0153uvre un plan de gouvernance en s\u00e9curit\u00e9 de l&rsquo;information et en cybers\u00e9curit\u00e9Claude Adam Conseiller principal en s\u00e9curit\u00e9 de l&rsquo;information,\u00a0Ville de BlainvilleL&rsquo;atelier vise \u00e0 expliquer le r\u00f4le de la gouvernance versus le r\u00f4le de la s\u00e9curit\u00e9 op\u00e9rationnelle. Le conf\u00e9rencier traitera des diff\u00e9rents domaines de gouvernance n\u00e9cessaires \u00e0 une bonne gestion des [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"1080","_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[22,21],"tags":[],"class_list":["post-290","post","type-post","status-publish","format-standard","hentry","category-ateliers-programmation","category-programmation"],"_links":{"self":[{"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/posts\/290","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/comments?post=290"}],"version-history":[{"count":4,"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/posts\/290\/revisions"}],"predecessor-version":[{"id":350,"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/posts\/290\/revisions\/350"}],"wp:attachment":[{"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/media?parent=290"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/categories?post=290"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/tags?post=290"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}